Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Juniper JN0-637 - Security, Professional (JNCIP-SEC)

Page: 1 / 4
Total 115 questions

A user reports that a specific application is not working properly. This application makes

multiple connection to the server and must have the same address every time from a pool and this behavior needs to be changed.

What would solve this problem?

A.

Use STUN.

B.

Use DNS doctoring.

C.

Use the address-persistent parameter.

D.

Use the persistent-nat parameter.

You are using ADVPN to deploy a hub-and-spoke VPN to connect your enterprise sites.

Which two statements are true in this scenario? (Choose two.)

A.

ADVPN creates a full-mesh topology.

B.

IBGP routing is required.

C.

OSPF routing is required.

D.

Certificate-based authentication is required.

Exhibit:

Referring to the flow logs exhibit, which two statements are correct? (Choose two.)

A.

The packet is dropped by the default security policy.

B.

The packet is dropped by a configured security policy.

C.

The data shown requires a traceoptions flag of host-traffic.

D.

The data shown requires a traceoptions flag of basic-datapath.

You have deployed two SRX Series devices in an active/passive multimode HA scenario.

In this scenario, which two statements are correct? (Choose two.)

A.

Services redundancy group 1 (SRG1) is used for services that do not have a control plane state.

B.

Services redundancy group 0 (SRG0) is used for services that have a control plane state.

C.

Services redundancy group 0 (SRG0) is used for services that do not have a control plane state.

D.

Services redundancy group 1 (SRG1) is used for services that have a control plane state.

What are three attributes that APBR queries from the application system cache module. (Choose Three)

A.

TTL

B.

destination port

C.

service

D.

DSCP

E.

protocol type

You want to enable transparent mode on your SRX series device.

In this scenario, which three actions should you perform? (Choose three.)

A.

Enable the ethernet-switching family on your Layer 2 interfaces

B.

Install a Layer 2 feature license.

C.

Reboot the SRX device.

D.

Ensure that no IRB interfaces are configured on the device.

E.

Add your Layer 2 interfaces to a security zone.

Which two statements are true when setting up an SRX Series device to operate in mixed mode? (Choose two.)

A.

A physical interface can be configured to be both a Layer 2 and a Layer 3 interface at the same time.

B.

User logical systems support Layer 2 traffic processing.

C.

The SRX must be rebooted after configuring at least one Layer 3 and one Layer 2 interface.

D.

Packets from Layer 2 interfaces are switched within the same bridge domain.

Exhibit:

The Ipsec VPN does not establish when the peer initiates, but it does establish when the SRX

series device initiates. Referring to the exhibit, what will solve this problem?

A.

IKE needs to be added for the host-inbound traffic on the VPN zone.

B.

The screen configuration on the untrust zone needs to be modified.

C.

IKE needs to be added to the host-inbound traffic directly on the ge-0/0/0 interface.

D.

Application tracking on the untrust zone needs to be removed.

Exhibit:

Which two statements are correct about the output shown in the exhibit. (Choose Two)

A.

The data shown requires a traceoptions flag of basic-datapath.

B.

The data shown requires a traceoptions flag of host-traffic.

C.

The packet is dropped by the default security policy.

D.

The packet is dropped by a configured security policy.

Exhibit:

You have deployed a pair of SRX series devices in a multimode HA environment. You need to enable IPsec encryption on the interchassis link.

Referring to the exhibit, which three steps are required to enable ICL encryption? (Choose three.)

A.

Install the Junos IKE package on both nodes.

B.

Enable OSPF for both interchassis link interfaces and tum on the dynamic-neighbors parameter.

C.

Configure a VPN profile for the HA traffic and apply to both nodes.

D.

Enable HA link encryption in the IPsec profile on both nodes.

E.

Enable HA link encryption in the IKE profile on both nodes,